446 lines
24 KiB
JSON
446 lines
24 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20151298",
|
|
"Version": "oval:org.altlinux.errata:def:20151298",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2015-1298: package `chromium` update to version 41.0.2272.101-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2015-1298",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1298",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09972",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09972",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2011-5319",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2011-5319",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-9689",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9689",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1206",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1206",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1212",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1212",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1213",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1213",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1214",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1214",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1215",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1215",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1216",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1216",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1217",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1217",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1218",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1218",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1219",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1219",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1220",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1220",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1221",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1221",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1222",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1222",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1223",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1223",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1224",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1224",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1225",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1225",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1226",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1226",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1227",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1227",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1228",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1228",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1229",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1229",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1230",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1230",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1231",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1231",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1232",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1232",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1245",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1245",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2238",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2238",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2239",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2239",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades chromium to version 41.0.2272.101-alt1. \nSecurity Fix(es):\n\n * BDU:2015-09972: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * CVE-2011-5319: content/renderer/device_sensors/device_motion_event_pump.cc in Google Chrome before 41.0.2272.76 does not properly restrict access to high-rate accelerometer data, which makes it easier for remote attackers to capture keystrokes via a crafted web site that listens for ondevicemotion events, a different vulnerability than CVE-2015-1231.\n\n * CVE-2014-9689: content/renderer/device_sensors/device_orientation_event_pump.cc in Google Chrome before 41.0.2272.76 does not properly restrict access to high-rate gyroscope data, which makes it easier for remote attackers to obtain speech signals from a device's physical environment via a crafted web site that listens for ondeviceorientation events, a different vulnerability than CVE-2015-1231.\n\n * CVE-2015-1206: Heap-based buffer overflow in Google Chrome before M40 allows remote attackers to cause a denial of service (unpaged memory write and process crash) via a crafted MP4 file.\n\n * CVE-2015-1212: Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-1213: The SkBitmap::ReadRawPixels function in core/SkBitmap.cpp in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.\n\n * CVE-2015-1214: Integer overflow in the SkAutoSTArray implementation in include/core/SkTemplates.h in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a reset action with a large count value, leading to an out-of-bounds write operation.\n\n * CVE-2015-1215: The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.\n\n * CVE-2015-1216: Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in bindings/core/v8/custom/V8WindowCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a frame detachment.\n\n * CVE-2015-1217: The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"\n\n * CVE-2015-1218: Multiple use-after-free vulnerabilities in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger movement of a SCRIPT element to different documents, related to (1) the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp and (2) the SVGScriptElement::didMoveToNewDocument function in core/svg/SVGScriptElement.cpp.\n\n * CVE-2015-1219: Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering.\n\n * CVE-2015-1220: Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-decoders/gif/GIFImageReader.cpp in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted frame size in a GIF image.\n\n * CVE-2015-1221: Use-after-free vulnerability in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect ordering of operations in the Web SQL Database thread relative to Blink's main thread, related to the shutdown function in web/WebKit.cpp.\n\n * CVE-2015-1222: Multiple use-after-free vulnerabilities in the ServiceWorkerScriptCacheMap implementation in content/browser/service_worker/service_worker_script_cache_map.cc in Google Chrome before 41.0.2272.76 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a ServiceWorkerContextWrapper::DeleteAndStartOver call, related to the NotifyStartedCaching and NotifyFinishedCaching functions.\n\n * CVE-2015-1223: Multiple use-after-free vulnerabilities in core/html/HTMLInputElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger extraneous change events, as demonstrated by events for invalid input or input to read-only fields, related to the initializeTypeInParsing and updateType functions.\n\n * CVE-2015-1224: The VpxVideoDecoder::VpxDecode function in media/filters/vpx_video_decoder.cc in the vpxdecoder implementation in Google Chrome before 41.0.2272.76 does not ensure that alpha-plane dimensions are identical to image dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted VPx video data.\n\n * CVE-2015-1225: PDFium, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.\n\n * CVE-2015-1226: The DebuggerFunction::InitAgentHost function in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 41.0.2272.76 does not properly restrict what URLs are available as debugger targets, which allows remote attackers to bypass intended access restrictions via a crafted extension.\n\n * CVE-2015-1227: The DragImage::create function in platform/DragImage.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not initialize memory for image drawing, which allows remote attackers to have an unspecified impact by triggering a failed image decoding, as demonstrated by an image for which the default orientation cannot be used.\n\n * CVE-2015-1228: The RenderCounter::updateCounter function in core/rendering/RenderCounter.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not force a relayout operation and consequently does not initialize memory for a data structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted Cascading Style Sheets (CSS) token sequence.\n\n * CVE-2015-1229: net/http/proxy_client_socket.cc in Google Chrome before 41.0.2272.76 does not properly handle a 407 (aka Proxy Authentication Required) HTTP status code accompanied by a Set-Cookie header, which allows remote proxy servers to conduct cookie-injection attacks via a crafted response.\n\n * CVE-2015-1230: The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in Google Chrome before 41.0.2272.76, has a name conflict with the AudioContext class, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that adds an AudioContext event listener and triggers \"type confusion.\"\n\n * CVE-2015-1231: Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-1232: Array index error in the MidiManagerUsb::DispatchSendMidiData function in media/midi/midi_manager_usb.cc in Google Chrome before 41.0.2272.76 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging renderer access to provide an invalid port index that triggers an out-of-bounds write operation, a different vulnerability than CVE-2015-1212.\n\n * CVE-2015-1245: Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium \"Open PDF in Reader\" button that has an invalid tab association.\n\n * CVE-2015-2238: Multiple unspecified vulnerabilities in Google V8 before 4.1.0.21, as used in Google Chrome before 41.0.2272.76, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-2239: Google Chrome before 41.0.2272.76, when Instant Extended mode is used, does not properly consider the interaction between the \"1993 search\" features and restore-from-disk RELOAD transitions, which makes it easier for remote attackers to spoof the address bar for a search-results page by leveraging (1) a compromised search engine or (2) an XSS vulnerability in a search engine, a different vulnerability than CVE-2015-1231.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2015-03-20"
|
|
},
|
|
"Updated": {
|
|
"Date": "2015-03-20"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-09972",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09972",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2011-5319",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2011-5319",
|
|
"Impact": "Low",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-9689",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9689",
|
|
"Impact": "Low",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1206",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1206",
|
|
"Impact": "Low",
|
|
"Public": "20171006"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1212",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1212",
|
|
"Impact": "High",
|
|
"Public": "20150206"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1213",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1213",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1214",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-190",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1214",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1215",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1215",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1216",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1216",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1217",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1217",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1218",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1218",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1219",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1219",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1220",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1220",
|
|
"Impact": "Low",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1221",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1221",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1222",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1222",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1223",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1223",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1224",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1224",
|
|
"Impact": "Low",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1225",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1225",
|
|
"Impact": "Low",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1226",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1226",
|
|
"Impact": "Low",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1227",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1227",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1228",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1228",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1229",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1229",
|
|
"Impact": "Low",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1230",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1230",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1231",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1231",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1232",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1232",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1245",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1245",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2238",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2238",
|
|
"Impact": "High",
|
|
"Public": "20150309"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2239",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-19",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2239",
|
|
"Impact": "Low",
|
|
"Public": "20150309"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151298001",
|
|
"Comment": "chromium is earlier than 0:41.0.2272.101-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151298002",
|
|
"Comment": "chromium-gnome is earlier than 0:41.0.2272.101-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151298003",
|
|
"Comment": "chromium-kde is earlier than 0:41.0.2272.101-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |